Akamai announced Content Protector, a product that stops scraping attacks without blocking the good traffic that companies need to enhance their business. Scraper bots are a critical and often... Read more »
Delinea announced that Kate Reed has joined the company as Chief Marketing Officer (CMO). With more than two decades of experience in technology and cybersecurity, Reed assumes leadership of... Read more »
OpenText announced the second generation of its advanced cybersecurity auditing technology. Today’s developers are dealing with more complexity and threats in multi-cloud environments. Security teams feel increasing pressure to... Read more »
NinjaOne announced it raised a $231.5 million Series C funding round led by ICONIQ Growth. Frank Slootman, Chairman and CEO of Snowflake; and Amit Agarwal, President of Datadog; among... Read more »
IBM announced IBM LinuxONE 4 Express, extending the latest performance, security and AI capabilities of LinuxONE to small and medium sized businesses and within new data center environments. The... Read more »
Group-IB identified a large-scale malicious campaign primarily targeting job search and retail websites of companies in the Asia-Pacific region. The group, dubbed ResumeLooters, successfully infected at least 65 websites... Read more »
Cisco introduced new capabilities and technologies across its networking portfolio that are designed to drive a more unified and integrated approach to managing and securing customer networks. IT organizations... Read more »
Five days after Mastodon developers pushed out fixes for a remotely exploitable account takeover vulnerability (CVE-2024-23832), over 66% of Mastodon servers out there have been upgraded to close the... Read more »
In this Help Net Security interview, Marco Eggerling, Global CISO at Check Point, discusses the challenge of balancing data protection with diverse policies, devices, and access controls in a... Read more »
Working at the speed of digital business is a constant challenge. But in today’s increasingly automated operational environment, crypto agility—i.e., an organization’s ability to (at the moment of compromise)... Read more »
